2 results (0.003 seconds)

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

Jenkins Anchore Container Image Scanner Plugin 1.0.24 and earlier does not escape content provided by the Anchore engine API, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control API responses by Anchore engine. Jenkins Anchore Container Image Scanner Plugin versiones 1.0.24 y anteriores, no escapa del contenido proporcionado por la API del motor Anchore, resultando en una vulnerabilidad de tipo cross-site scripting (XSS) almacenado, explotable por atacantes capaces de controlar las respuestas de la API por el motor Anchore • https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2821 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Jenkins Anchore Container Image Scanner Plugin 1.0.19 and earlier stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. Jenkins Anchore Container Image Scanner Plugin versión 1.0.19 y anteriores, almacenan credenciales sin cifrar en los archivos config.xml de trabajo en el maestro de Jenkins, donde pueden ser visualizadas por parte de usuarios con permiso de Lectura Extendida, o acceso al sistema de archivos maestro. • http://www.openwall.com/lists/oss-security/2019/11/21/1 https://jenkins.io/security/advisory/2019-11-21/#SECURITY-1539 • CWE-522: Insufficiently Protected Credentials •